Hierarchical structures are abundant in nature, such as in the superhydrophobic surfaces of lotus leaves and the structural coloration of butterfly wings. They consist of ordered features across multiple size scales, ...
详细信息
The detection of changes in land cover and land use (LCLU) is crucial for various geospatial applications, including urban development and environmental management. One vital aspect of LCLU research involves identifyi...
详细信息
ISBN:
(数字)9798350381993
ISBN:
(纸本)9798350382006
The detection of changes in land cover and land use (LCLU) is crucial for various geospatial applications, including urban development and environmental management. One vital aspect of LCLU research involves identifying modifications in impervious surface cover, which has significantly increased due to global economic growth and the rising urban population in many parts of the world. This investigation employs Landsat 9 OLI- 2/TIRS-2 imagery with a 30m spatial resolution to map structures in the Ziarat District of Pakistan, encompassing forests, water bodies, and barren land. It aims to detect changes in tree cover and canopy height. A time series of Landsat 9 OLI-2/TIRS-2 images were utilized to create change detection and land cover maps. The Analysis of Land Cover and Land Use (LCLU) for the Ziarat District was conducted using the GEE platform. The satellite images were classified into broad land cover classes, which include impervious surfaces, forest/tree cover, grassland/cropland, and water. The generated change detection map facilitates the identification of locations that have undergone modifications due to new constructions, offering valuable insights for the implementation of urban development policies and disaster management on a global scale.
Every year, diabetes causes health difficulties for hundreds of millions of individuals throughout the world. Patients' medical records may be utilized to quantify symptoms, physical characteristics, and clinical ...
详细信息
Digital twin (DT) technology enables the replica of physical objects and environmental statuses of a physical system, which can be used for further simulation, analysis, and prediction. By combining DT with mobile edg...
Digital twin (DT) technology enables the replica of physical objects and environmental statuses of a physical system, which can be used for further simulation, analysis, and prediction. By combining DT with mobile edge computing (MEC), a new paradigm called digital twin edge networks (DITEN) is able to fill the gap between physical edge networks and digital systems and provide novel services to physical devices. Due to possible failure in data sensing, balancing sensing time and successful sensing rate needs to be considered to ensure the freshness of collected data in DITEN. Additionally, an optimal data scheduling policy is necessary to ensure efficient communication between physical devices and the edge server while maintaining the accuracy of DT. Therefore, this paper proposes a joint optimization problem for the sensing and communication for DITEN. Due to the nonconvex nature of the formulated problem, we decompose the original problem into three subproblems, and an iterative optimization algorithm is proposed to minimize the system overhead of DNT realization. The effectiveness of the proposed method is evaluated through extensive simulations.
This paper introduces a new self-balancing buck PFC Multilevel Rectifier based on a five-level Switched Capacitors (SCs) architecture. The proposed design offers a broad range of output voltage, enabling operation wit...
This paper introduces a new self-balancing buck PFC Multilevel Rectifier based on a five-level Switched Capacitors (SCs) architecture. The proposed design offers a broad range of output voltage, enabling operation with various loads and accommodating both single and double/dual output modes. Additionally, it ensures effective load voltage balancing, even when the both loads have different values. The rectifier functions in buck operation mode and provides extensive output voltage regulation, making it suitable for simultaneous electric vehicle (EV) battery charging. To evaluate the performance of proposed rectifier this paper explores the operating principle, modulation strategy, closed-loop control, and experimental validation with same and different load variation scenarios.
The cloud is a vast network of interconnected servers and other devices that provide computing, communication, and storage services. The cloud market is dynamic, with ever-changing user needs and resource demands. Res...
The cloud is a vast network of interconnected servers and other devices that provide computing, communication, and storage services. The cloud market is dynamic, with ever-changing user needs and resource demands. Resource availability may be impacted by changes in the market, such as the addition or removal of service providers. When it comes to policies, standards, and preferences, cloud service providers and new line users are worlds apart. Even though several CSPs provide the same services, new line Access to and pricing for these services can seem different from one provider to the next. There are many advantages to using cloud computing, such as reduced overhead due to centralization, the ability to work remotely from anywhere with an Internet connection, and increased productiv-ity. More research is needed into the cloud's privacy and security risks. To manage the degree of dimensionality, heterogeneity, and ambiguity associated with cloud services, a Cloud Access Security Broker (CASB) can be deployed between consumers of cloud services and cloud applications in a cloud computing (CC) environment. They allow the company to expand its security measures beyond its structure, into third-party software and data storage. To better understand how service users deploy CASBs to provide acceptable security solutions for cloud systems, and to figure out the elements that support or hinder the adoption of CASBs by organizations using remote computing technologies, an analysis based on themes was performed. This paper will provide an in-depth analysis of the security challenges experienced by various stakeholders in cloud computing, including cloud service providers, data owners, and cloud environments.
The key of swaying tree simulation is to capture the essence of the interaction between wind and tree, which has not received much attention from scholars. In this paper, we present a method for simulating swaying tre...
详细信息
The key of swaying tree simulation is to capture the essence of the interaction between wind and tree, which has not received much attention from scholars. In this paper, we present a method for simulating swaying tree based on slicing partition. The tree is divided into multiple "slices", and then jointly moved to simulate the tree swaying in wind. By slicing partition,the motion of any slice is independent of the others concurrently, which provides a parallel spatial topology for real-time calculation. Moreover, based on the fact that the wind will blow to a tree partly rather than the whole, partial swayings of the tree are also simulated. The experimental results show the correctness and effectiveness of our method.
Cloud computing has been around for quite long, yet some organizations have never used it, especially MSMEs in Indonesia. Several factors hinder its implementation by MSMEs, including unequal infrastructure for using ...
详细信息
In the evolving landscape of 6G networks, semantic communications are poised to revolutionize data transmission by prioritizing the transmission of semantic meaning over raw data accuracy. This paper presents a Vision...
详细信息
With the rapid development of natural language processing technology, various fields are constructing domain knowledge graphs and trying to integrate multi-domain knowledge graphs to better grasp the information of ea...
详细信息
ISBN:
(数字)9798350391367
ISBN:
(纸本)9798350391374
With the rapid development of natural language processing technology, various fields are constructing domain knowledge graphs and trying to integrate multi-domain knowledge graphs to better grasp the information of each domain. Aiming at this trend, we proposed the GE-CSM model, which is a novel model that combines graph embedding and context semantic matching. By combining entity-relationship graph embedding and context semantic matching, the model is able to understand the relationships between entities more accurately and provide more semantic information based on the context. Finally, through experimental validation, the effectiveness of the model in performing multiple knowledge graph integration is demonstrated, and the response time and semantic richness of the downstream Q&A task are improved, proving its potential in enhancing semantic interaction performance.
暂无评论